Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Click on a link below for information on how you can ensure your IT systems comply with security standards. .
Last week the National Institute of Standards and Technology (NIST) announced version 1.0 of its new Privacy Framework, a resource designed to help organizations manage privacy risks.
The much anticipated California privacy law officially took place on Wednesday, January 1, a year and a half after it was passed and signed.
The latest research from Blueliv has found that the number of compromised credentials detected in North American botnets grew 141% from the last quarter.
Dow Jones & Company has accidentally leaked the personal details and financial information of at least 2.2 million of its customers, but security experts believe this number is said to increase.
China’s controversial Cyber Security Law (CSL) that’s had foreign companies panicking to figure out how to get compliant will take effect tomorrow, June 1, 2017.
As we enter the New Year, organizations globally are accessing the biggest security threats set to impact their organization and developing risk management strategies to help ward off cyber threats.
New York Governor, Andrew Cuomo, introduced new cybersecurity proposals in his January State of the State address following the recent DNC hack and Russia’s attempt to influence the 2016 election in favor of Republican Donald Trump.
The online identities of thousands of Britons are currently available for purchase on the Darknet, with thousands infiltrated from government databases.
It has been claimed in a recent report carried out by Allianz Global, that cyber-crime in the UK is costing businesses around £2.8 billion annually.
Rutgers University in New Brunswick has announced that it is to spend up to $3 million (£1.9 million) preventing cyber hackers from damaging the university's networks through implementing stringent cyber security.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.